Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/11/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
FLY.exe
Resource
win7-20231020-en
General
-
Target
FLY.exe
-
Size
575KB
-
MD5
d400c125c91f0da96b71a1335d5c7e9e
-
SHA1
c5cadd640c60cc5ae5377fa8726c15f38808a131
-
SHA256
6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7db
-
SHA512
8d77dc100e939fd72e3036307883584af47c35298e049fbc3c92cfb94c4a782180ff0a5c5148d72e4f2e39d6208c9237f65b1f6488e5bfa31cca5c30c0ffbf2f
-
SSDEEP
12288:nE+RIimQdL6iHOHpF2hJwy+atu6KVC94MVK4ENzZK:nE+evGOHpKavI4YEN
Malware Config
Extracted
formbook
4.1
cc73
viptop77.biz
sell-home-fast-for-cash.xyz
wjbwebsite.top
ceramic.house
anthologymotors.com
acctwiseconsulting.com
xn--bj4blri6mqqan64b.com
roguester.com
blavkimped.com
mostbet-wih8.xyz
biellacapital.com
jasonmoorehead.online
wolrdtenis.com
huahuiblog.com
jonniprince.com
gohanyo.com
l4-j2.pro
coinyeard.com
fh8019.com
iltorlonia.com
themobilefinder.com
taipush.com
qlw3wm.top
akersbusinesslaw.com
imluodiyue.com
niok-blase.top
palmettobaynews.com
brothers-style.com
zg9tywlubmftzw5ldze3njm.com
amihad.company
zaymnokpo.online
rabbit-tantei.site
oncologyphotos.com
aqdydep.com
kt8mx41vvk0gp4f.xyz
bushypussypi.com
kishanobd.com
amazonva.info
poker-dewa88.com
exhibit-t.com
10923.top
doneforyouph.com
topantisnoringdevice.com
gwf952.com
hjnnhhyyu.com
120bahis1000.com
niloticus.com
spitzpr-fu.info
3gmosoft.com
datalinkstore.com
crossidea.net
qplezamczb.com
h3b8c.com
wtjtv5.cyou
tizusano.com
audreydeshetler.com
deutschebankcredits.com
tanpabatas16.click
amegjenerator.com
smnrx.com
hh-brilliance.com
bixas.xyz
krebls.com
pharmacogeneticsreviews.com
ribbon-555.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2432-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2432-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2684-21-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/2684-23-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2304 set thread context of 2432 2304 FLY.exe 29 PID 2432 set thread context of 1220 2432 FLY.exe 22 PID 2684 set thread context of 1220 2684 colorcpl.exe 22 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2304 FLY.exe 2432 FLY.exe 2432 FLY.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe 2684 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2432 FLY.exe 2432 FLY.exe 2432 FLY.exe 2684 colorcpl.exe 2684 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2304 FLY.exe Token: SeDebugPrivilege 2432 FLY.exe Token: SeDebugPrivilege 2684 colorcpl.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1576 2304 FLY.exe 28 PID 2304 wrote to memory of 1576 2304 FLY.exe 28 PID 2304 wrote to memory of 1576 2304 FLY.exe 28 PID 2304 wrote to memory of 1576 2304 FLY.exe 28 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 2304 wrote to memory of 2432 2304 FLY.exe 29 PID 1220 wrote to memory of 2684 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2684 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2684 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2684 1220 Explorer.EXE 30 PID 2684 wrote to memory of 2676 2684 colorcpl.exe 31 PID 2684 wrote to memory of 2676 2684 colorcpl.exe 31 PID 2684 wrote to memory of 2676 2684 colorcpl.exe 31 PID 2684 wrote to memory of 2676 2684 colorcpl.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\FLY.exe"C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FLY.exe"3⤵
- Deletes itself
PID:2676
-
-